IT Onboarding Checklist: Set Up New Employees Securely and Efficiently
Posted: December 31, 1969 to Cybersecurity.
IT Onboarding Checklist: Set Up New Employees Securely and Efficiently
The first day at a new job sets the tone for everything that follows. When a new employee shows up and their laptop is ready, their accounts are active, their email is flowing, and they can access the tools they need, they start contributing immediately. When they arrive to discover that IT did not know they were coming, their hardware is backordered, and nobody can tell them which systems they need access to, the organization has already failed its first test of competence in that employee's eyes.
But onboarding is not just about making a good impression. It is one of the highest-risk moments in the employee lifecycle from a security perspective. New accounts are being provisioned, access is being granted, and a person who may have limited familiarity with your security policies is being handed the keys to your systems. Every shortcut taken during onboarding creates a vulnerability that persists until someone discovers and corrects it, which may be never.
At Petronella Technology Group, we have refined IT onboarding processes for businesses across dozens of industries over 23 years of managed IT services work. What follows is the comprehensive checklist we have developed through that experience, designed to get employees productive quickly while maintaining the security posture your organization depends on.
Pre-Arrival Preparation: 5 to 10 Business Days Before Start Date
The most critical onboarding work happens before the new employee ever walks through the door. Waiting until day one to start provisioning creates delays, forces workarounds, and introduces security shortcuts that become permanent problems.
Hardware Procurement and Configuration
- Order or allocate hardware: Laptop or desktop, monitor(s), keyboard, mouse, headset, webcam, phone, and any role-specific peripherals. Maintain an inventory of pre-configured spare devices to avoid delays when hardware needs exceed lead times.
- Configure the device: Install the operating system with current patches, join the device to the domain or MDM platform, install required applications, configure encryption (BitLocker, FileVault), and verify that endpoint protection is active and reporting to your security console.
- Apply security baselines: Enforce password policies, screen lock timeouts, USB device restrictions, and application whitelisting. These controls must be in place before the device reaches the user.
- Label and document: Record the device serial number, assign it to the employee in your asset management system, and attach asset tags.
Account Provisioning
- Create the user account: Set up Active Directory or identity provider accounts with appropriate group memberships based on the employee's role and department. Use role-based access control (RBAC) to assign the minimum necessary permissions.
- Email configuration: Create the email account, configure distribution group memberships, set up email signature templates, and verify that email flows correctly before day one.
- Application access: Provision accounts for all required SaaS applications, project management tools, communication platforms, and line-of-business software. Document which applications the employee has been granted access to.
- VPN and remote access: If the employee will work remotely at any point, configure VPN access and verify connectivity. Provide remote desktop or virtual desktop access as needed.
- Phone system: Assign an extension, configure voicemail, and set up the desk phone or softphone application.
Workspace Preparation
- Physical workspace: Ensure the desk, chair, and workspace are ready. For hybrid or remote employees, confirm that home office equipment needs have been addressed.
- Access badges and keys: Issue building access badges, parking credentials, and any physical keys needed. Configure badge access for appropriate zones and hours.
- Network drops: Verify that the network port at the employee's desk is active and connected to the correct VLAN.
Documentation and Notifications
- Notify the IT team: Ensure that helpdesk staff know a new employee is starting, their role, and what systems they will use. Nothing undermines onboarding faster than a new hire calling IT support and hearing "we did not know you were coming."
- Prepare welcome documentation: Compile Wi-Fi credentials, printer setup instructions, common application guides, helpdesk contact information, and any department-specific technical documentation.
- Schedule training sessions: Book time for security awareness training, application training, and any compliance-specific onboarding required for the employee's role.
Day-One Setup: The First Four Hours
The employee's first day should be structured so they can be productive by lunch. Everything they need should already be in place. Day one is about activation and orientation, not configuration and troubleshooting.
MFA Enrollment
Multi-factor authentication enrollment should be the very first technical task a new employee completes, before they access any systems. Walk them through enrolling their authentication app, registering their phone number for SMS backup codes, and understanding when and why MFA prompts will appear. Do not skip this step or defer it. Every hour an account exists without MFA is an hour it is vulnerable to credential-based attacks.
Security Awareness Briefing
Before giving a new employee access to company systems, they need to understand the rules of the road. This initial briefing should cover:
- Acceptable use policy: What company systems and devices may be used for, what is prohibited, and the consequences of policy violations. Have the employee sign the policy during onboarding.
- Password policy: Password length and complexity requirements, prohibition against password reuse, and how to use the company-approved password manager.
- Phishing awareness: How to identify suspicious emails, what to do when they receive one (report, do not click, do not forward), and who to contact if they think they have made a mistake. Show them real examples of phishing emails that have targeted your organization.
- Data handling: Classification of company data, what can and cannot be shared externally, approved methods for transferring files, and restrictions on personal cloud storage services.
- Physical security: Badge usage, visitor policies, clean desk requirements, and rules for securing devices when leaving the workspace.
- Reporting procedures: How to report security incidents, suspicious activity, lost or stolen devices, and policy violations they observe.
Craig Petronella has written extensively about the human factor in cybersecurity across his 15 books, and the consistent finding is that the quality of onboarding security training directly correlates with an employee's security behavior for their entire tenure. Organizations that rush through this step or skip it entirely pay the price in preventable incidents down the road.
System Access and Verification
- Log in to all primary systems: Have the employee log in to their computer, email, VPN, and every key application on day one. This verifies that provisioning was completed correctly and identifies any access issues while IT support is actively available to resolve them.
- Test printing: Walk the employee through printer setup, including secure print release if your organization uses it.
- Communication tools: Ensure Teams, Slack, or whatever communication platform your organization uses is configured and that the employee has been added to the appropriate channels and groups.
- Calendar and scheduling: Verify calendar access, shared calendars for their team, and conference room booking procedures.
First-Week Tasks: Days 2 Through 5
The first week builds on day-one basics with deeper system training and integration into team workflows.
Application-Specific Training
Schedule dedicated training sessions for each major application the employee will use in their role. This includes line-of-business applications, CRM systems, project management tools, documentation platforms, and any industry-specific software. Pair the new employee with a team member who can answer questions and demonstrate workflows in context.
Compliance Training
Depending on your industry, first-week compliance training may include:
- HIPAA awareness: For organizations handling protected health information, employees must understand HIPAA requirements, what constitutes PHI, minimum necessary standards, and breach notification procedures.
- CMMC/CUI handling: For defense contractors, employees with access to controlled unclassified information need training on marking, handling, storage, and transmission requirements under CMMC.
- PCI DSS: For employees handling payment card data, training on cardholder data environment boundaries and acceptable handling procedures.
- Privacy regulations: General training on applicable privacy regulations such as GDPR, CCPA, or state-specific privacy laws.
Documentation and Knowledge Base Access
Introduce the employee to your knowledge base, documentation repositories, and internal wikis. Show them where to find standard operating procedures, technical documentation, and answers to common questions. Employees who know where to find information independently resolve issues faster and generate fewer support tickets.
Backup and Data Protection
Ensure the employee understands where to save files (approved locations, not the desktop or local drive), how file versioning and backup works, and what to do if they accidentally delete or overwrite important data. Verify that their device backup is configured and running.
Security Onboarding: Building Good Habits From Day One
Security onboarding extends beyond the initial briefing. During the first 30 days, several additional security measures should be completed.
Simulated phishing test: Send a simulated phishing email within the first two weeks. This is not meant to trick or embarrass the new employee. It provides a baseline measurement of their awareness and creates a teachable moment that reinforces the training they received on day one.
Password manager setup: Walk the employee through setting up the company-approved password manager, importing any existing credentials, and generating unique passwords for each application. Verify that they are not reusing passwords across systems.
Secure file sharing: Demonstrate the approved methods for sharing files internally and externally. Show them why emailing attachments or using personal Dropbox accounts creates risk, and how the approved alternatives work.
Mobile device management: If the employee will access company data from personal mobile devices, enroll those devices in your MDM platform. Configure containerization to separate company data from personal data, and ensure the device meets minimum security requirements (current OS, screen lock enabled, encryption active).
At PTG, our ComplianceArmor platform helps organizations track and document these onboarding security steps as part of their overall compliance program. Every completed training, signed policy, and verified configuration becomes part of the compliance record that auditors and assessors need to see.
The Offboarding Counterpart: When Employees Leave
No onboarding checklist is complete without addressing its counterpart. Offboarding is where many organizations fail catastrophically from a security standpoint. Accounts that remain active after an employee departs are a leading cause of data breaches and unauthorized access incidents.
An effective offboarding process should be just as structured as onboarding:
- Immediate account disablement: On the employee's last day (or before, in involuntary terminations), disable all accounts including Active Directory, email, VPN, SaaS applications, and remote access. Do not delete accounts immediately; disable them first to preserve data and audit trails.
- Access review: Audit all systems and applications the departing employee had access to. Check for shared accounts, service accounts, and any access that may have been granted informally.
- Device recovery: Collect all company-owned devices, access badges, keys, and physical assets. For remote employees, provide prepaid shipping for device return.
- Data preservation: Back up the departing employee's email, files, and any project data before removing access. Transfer ownership of shared documents and resources to their manager or successor.
- Credential rotation: Change passwords for any shared accounts, service accounts, or systems where the departing employee had administrative access. Update any shared credentials they may have known.
- License recovery: Reclaim software licenses assigned to the departing employee and reallocate or release them.
Automating Onboarding With Your MSP
For organizations working with a managed IT services provider, much of the onboarding process can be standardized and partially automated. Role-based templates define the standard set of accounts, applications, and access levels for each position. When HR notifies IT of a new hire, the template triggers automated provisioning workflows that create accounts, assign licenses, and configure access based on the role.
Automation reduces human error, speeds up provisioning, and ensures consistency. Every new employee in a given role receives the same baseline access, configured the same way, with the same security controls applied. No accounts are missed because someone forgot to check a box on a manual checklist.
At Petronella Technology Group, we build these onboarding workflows as part of our managed IT engagements. HR submits a new hire request through our ticketing system with the employee's name, role, department, start date, and manager. Our team handles everything else, delivering a fully configured, secure workstation and complete account setup before the employee's first day.
If your organization's onboarding process still relies on informal email chains, paper checklists, or last-minute scrambling, the security and efficiency gains from a structured, automated approach are substantial. Contact us to discuss how we can help standardize your IT onboarding and offboarding processes.